Authentication

Confidentiality, integrity, and availability are supported by authentication and authorization. This video also introduces a new term, accountability. Once you are given authorization, you are accountable for what occurs with your account. This is a good reason not to share authentication credentials. The video addresses four types of user authentication: password, certificate-based, biometrics, and e-tokens. Be able to describe the process for each type of authentication and the drawbacks of each one. You will recognize some information from the unit on cryptography.


Source: Computing for All, https://www.youtube.com/watch?v=LSZGi5Y-pJ0
Creative Commons License This work is licensed under a Creative Commons Attribution 3.0 License.

Last modified: Wednesday, August 7, 2024, 2:22 PM